RootMe is an introductory-level box available on the TryHackMe platform, designed to assess your skills in directory busting and exploiting unrestricted file upload vulnerabilities. Before delving into this walkthrough, I highly recommend attempting to solve the challenges presented in the room independently. This approach not only enhances your learning experience but also reinforces your understanding of the concepts involved.
![]() |
| FIGURE-1 |
![]() |
| FIGURE-2 |
![]() |
| Figure-3 |
![]() |
| FIGURE-5 |
Looks like we have an upload form here! Any files uploaded here will populate in /uploads, so we’ll have an easy way to execute anything we upload to the server.
Task-3: Getting a shell.
Find a form to upload and get a reverse shell, and find the flag.
Now try to upload a PHP reverse shell and execute it from the /uploads directory.
For this, I will be using the infamous php-reverse-shell.php from pentestmonkey. You can grab it here: php-reverse-shell
Just copy and paste this code into a text file, and change the information below:
![]() |
| Figure-6 |
Once this is changed, go ahead and save this as a .php file, and it’s ready for upload! Let’s upload this to the website, navigate to and select the file as you would normally:
And as you click upload it looks like server is not taking .php file. What to do it that case? We know that we have .php file and .php file can go in different extensions, quick look into Google and you will see that other extensions are: .php3, .php4, .php5, .php7, .pthml, .pht.
![]() |
| Figure-7 |
![]() |
| Figure-8 |
Now we need to go to ip_addr/uploads/ and also start our netcat listener in the terminal.
![]() |
| Figure-9 |

Answer the questions below
Question:1 user.txt
Answer: THM{y0u_g0t_a_sh3ll}
![]() |
| Figure-11 |
![]() |
| Figure-13 |













No comments:
Post a Comment